|
All Internet connected organizations should schedule regular independent security audits. Kinectit offers the following security services separately or as components of a comprehensive data security audit:
Onsite Computer Inspection is an analysis of your company's computer system security at your location. All findings are included in a comprehensive audit report.
Security Policy Review is a thorough review of your security policies, based on your unique security needs and audit requirements.
Internal Network Vulnerability Assessment is an internal security assessment of your corporate network. Every computer/server/network device is tested for over 3,000 security weaknesses. A report is provided detailing the security of each network device. The report includes recommendations for resolving any discovered security problems.
Penetration Testing is a thorough security evaluation of your network perimeter. Footprinting or profiling is the first step. Then a complete vulnerability assessment is performed. Once the assessment is completed then all remote access vulnerabilities are manually applied to attempt penetration of your perimeter. A report is provided documenting the penetration efforts and recommendations for improving your external network security.
Manual Computer Inspection is performed for companies who want to verify their equipment (server, workstation, firewall, router, etc.) is running the appropriate software revisions. Virus software and other critical software components are manually inspected and the findings are provided in an audit report.
Wireless Security is a test to identify wireless accessibility to unauthorized computers and data. Using the latest wireless network tools we document all discovered security weaknesses. A report is provided detailing the discovered weaknesses with recommendations for improvement.
Computer Security Crisis Response
If you have a security emergency such as a website defacement, attacker intrusion, internal employee computer misuse, data theft, data destruction, etc. we can help you resolve these incidents. Contact us for immediate assistance with your urgent security issues.
|